Author:
Fridrich Jessica,Kodovský Jan,Holub Vojtěch,Goljan Miroslav
Publisher
Springer Berlin Heidelberg
Reference18 articles.
1. LNCS;P. Bas,2011
2. Bas, P., Furon, T.: BOWS-2 (July 2007), http://bows2.gipsa-lab.inpg.fr
3. Cancelli, G., Doërr, G., Cox, I.J., Barni, M.: A comparative study of ±1 steganalyzers. In: Proceedings IEEE International Workshop on Multimedia Signal Processing, Cairns, Australia, October 8-10, pp. 791–796 (2008)
4. Chen, C., Shi, Y.Q.: JPEG image steganalysis utilizing both intrablock and interblock correlations. In: IEEE International Symposium on Circuits and Systems, ISCAS 2008, pp. 3029–3032 ( May 2008)
5. Filler, T., Pevný, T., Bas, P.: BOSS (July 2010), http://boss.gipsa-lab.grenoble-inp.fr/BOSSRank/
Cited by
41 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cover-source mismatch in steganalysis: systematic review;EURASIP Journal on Information Security;2024-08-12
2. PRIS: Practical robust invertible network for image steganography;Engineering Applications of Artificial Intelligence;2024-07
3. Modified Bird Swarm Algorithm for blind image steganalysis;International Journal of Information Technology;2023-06-27
4. HyperSteg: Hyperbolic Learning for Deep Steganography;ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP);2023-06-04
5. Subsequent Embedding in Targeted Image Steganalysis: Theoretical Framework and Practical Applications;IEEE Transactions on Dependable and Secure Computing;2023-03-01